To read this content please select one of the options below:

Removal of all unauthorized access paths in production software

Charles Cresson Wood (Independent Information Security Consultant, Sausalito, California, USA)

Information Management & Computer Security

ISSN: 0968-5227

Article publication date: 1 December 1996

339

Abstract

Presents a policy considered necessary to prevent breaches of security when software is moved from development to production. Contends that although information is a valuable, global commodity it is often unprotected. Presents suggestions to prevent encryption code from being broken. Gives guidelines for the security of encryption keys. Looks at the costs and benefits of encryption, packet encryption and the Internet. Discusses US policy, the US Computer Security Act and the US government proposals for information security

Keywords

Citation

Cresson Wood, C. (1996), "Removal of all unauthorized access paths in production software", Information Management & Computer Security, Vol. 4 No. 5, pp. 22-23. https://doi.org/10.1108/09685229610153148

Publisher

:

MCB UP Ltd

Copyright © 1996, Company

Related articles